Back to Search Begin New Search Save Search Auto-Notify
Educational Forum: How to Leverage Your...
It is a myth to say that the government doesn't utilize social media tools; in fact, in the age of transparency, social media has exploded within government agencies. With that said, the tools can be very effective within the government contracting space, as long as you know how to use them to your advantage. From LinkedIn, blogging, Twitter, Facebook, YouTube, and everything in between, Elizabeth Shea, President and CEO of SpeakerBox Communic...
August 24, 2012
Organizer: SECAF
Location: Vienna, VA
Add Favorite
Predictive Analytics & Data Mining: Mod...
Learn how experts mine data by attending The Modeling Agency's vendor-neutral and application-oriented predictive analytics and data mining courses. Participants will learn about predictive modeling strategy, best practices, capabilities, limitations, risks, rewards, methods, tools, techniques, applications, practice, and how to get started. Courses may be attended independently, or as a series. Since The Modeling Agency is not a tools vendor,...
August 20-24, 2012
Organizer: The Modeling Agency
Location: San Francisco Bay Area / San Jose, CA
Add Favorite
2012 8th Annual GFIRST National Conference
Registration will be available in late Spring/early Summer. Benefits of attending the GFIRST Conference include: Networking with more than 1,500 of your peers, including top information security professionals and government officials Access to exhibitors’ cutting-edge solutions and technology demonstrations at the Vendor Expo Hearing expert speakers discuss the latest in cybersecurity news and trends as seen by government agencies, law e...
August 19-24, 2012
Organizer: Department of Homeland Security
Location: Atlanta, GA
Add Favorite
SEQRA
Benefits Protect your organization - know the ins and outs of SEQRA. Join us for this seminar and get practical information about a complex area of the law presented by an extremely knowledgeable faculty in an interactive format. Get a handle on complicated issues surrounding SEQRA strategies. Avoid problems down the road by protecting yourself and your company - find out exactly what the critical issues are and how to best handle them. You wi...
August 23, 2012
Organizer: Lorman Education Services
Location: East Syracuse, NY
Add Favorite
Current Issues in Storm Water Management
Benefits Save money by avoiding costly mistakes in storm water management. From recent litigation to changing permitting standards, failing to stay on top of current issues related to storm water regulation is risky. In this seminar, you will get answers to all your questions, such as: What new case and policy decisions impact my practices? What are the latest trends in the water quality arena? Here is your chance to learn - in just one day -...
August 23, 2012
Organizer: Lorman Education Services
Location: Santa Ana, CA
Add Favorite
Unraveling Certified Payroll Requiremen...
L2 Federal Resources presents an exclusive contracting webinar... LIVE WEBINAR | Thursday, August 23, 2012 | 1PM Eastern Unraveling Certified Payroll Requirements on Federal Construction Contracts Making the move from residential/commercial construction projects to government-funded construction projects, which have certified payroll reporting requirements, can be overwhelming for most contractors, their office staff, and the accounting profe...
August 23, 2012
Organizer: L2 Federal Resources, LLC
Location: Rockville, MD
Add Favorite
Mobilizing the Business of Defense
As early as next year, Department of Defense (DoD) personnel may be able to connect their personal mobile devices - Android, iPhone, iPad - to unclassified DoD networks. To get to a true Bring Your Own Device (BYOD) strategy, however, the DoD will need to focus on four key areas: technology, policy, security and culture. While ensuring that the devices themselves meet minimum security requirements is important, the greatest challenge will be o...
August 23, 2012
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
Defense Connect Online via VMware View
A variety of federal agencies are considering options for enabling employees to do their jobs from devices other than PCs, but can this be done efficiently, securely, and with an easy-to-manage environment? With VMware, you can. Join us to learn how VMware View technology is optimizing Defense Connect Online (DCO) users' performance in virtual environments. Best practices and simple use cases will be covered during this live webcast. Attendee...
August 23, 2012
Organizer: VMware Government at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Today's Threat Landscape and Symantec's...
The explosion of information in enterprise data stores and online has created a target-rich environment for hackers, thieves, and malicious insiders. As the risks of data loss and inadvertent disclosure have grown, so have the costs. Hacker attacks have compromised technology firms, credit-card processors, and defense contractors; insider exploits have brought down major banks; and the financial, regulatory, and legal impacts are growing by l...
August 23, 2012
Organizer: Symantec Government at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
iPhone and iPad Forensics in a BYOD World
Apple’s growing leadership in the smart phone and tablet industry has helped fuel the rapid BYOD (Bring Your Own Device) program adoption among enterprise and government organizations. Program adoption rates continue to outpace the acceptable use policies and incident response tactics needed to safely and securely incorporate these devices into a BYOD environment. Additionally, Apple iOS device operating system architecture and encrypti...
August 23, 2012
Organizer: BlackBag Government at Carahsoft Technology Corp.
Location: Webcast, VA
Add Favorite
Back to Search Begin New Search